The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of IBM Db2 UDB

Apache ZooKeeper: information disclosure via getACL
An attacker can call getACL() of Apache ZooKeeper, in order to get sensitive information...
6198380, 6335235, CERTFR-2020-AVI-587, CVE-2019-0201, DLA-1801-1, DSA-4461-1, VIGILANCE-VUL-29365
IBM DB2: buffer overflow
An attacker can trigger a buffer overflow of IBM DB2, in order to trigger a denial of service, and possibly to run code...
CVE-2019-4014, ibm10878793, VIGILANCE-VUL-28911
IBM DB2: buffer overflow via libdb2e.so.1
An attacker can trigger a buffer overflow via libdb2e.so.1 of IBM DB2, in order to trigger a denial of service, and possibly to run code...
CVE-2018-1936, ibm10741481, VIGILANCE-VUL-28910
IBM DB2: privilege escalation via Shared Libraries Loading
An attacker can bypass restrictions via Shared Libraries Loading of IBM DB2, in order to escalate his privileges...
CVE-2019-4094, ibm10875860, VIGILANCE-VUL-28736
IBM DB2: six vulnerabilities
An attacker can use several vulnerabilities of IBM DB2...
CVE-2018-1922, CVE-2018-1923, CVE-2018-1978, CVE-2018-1980, CVE-2019-4015, CVE-2019-4016, ibm10740413, VIGILANCE-VUL-28691
IBM DB2: denial of service via TRUNCATE System Z
An attacker can generate a fatal error via TRUNCATE System Z of IBM DB2, in order to trigger a denial of service...
CVE-2018-1977, ibm10788089, VIGILANCE-VUL-28035
IBM DB2 LUW: file reading via IBM Spectrum Scale
A local attacker can read a file via IBM Spectrum Scale of IBM DB2 LUW, in order to obtain sensitive information...
CVE-2018-1723, ibm10734067, VIGILANCE-VUL-27899
IBM DB2: buffer overflow via db2pdcfg
An attacker can generate a buffer overflow via db2pdcfg of IBM DB2, in order to trigger a denial of service, and possibly to run code...
737295, CVE-2018-1897, ibm10737295, ibm10793417, VIGILANCE-VUL-27898
IBM DB2: four vulnerabilities
An attacker can use several vulnerabilities of IBM DB2...
CVE-2018-1780, CVE-2018-1781, CVE-2018-1799, CVE-2018-1834, ibm10733939, ibm10793415, VIGILANCE-VUL-27704
IBM DB2: privilege escalation via Untrusted Loaded Libraries
An attacker can bypass restrictions via Untrusted Loaded Libraries of IBM DB2, in order to escalate his privileges...
CVE-2018-1802, ibm10733122, VIGILANCE-VUL-27703
Our database contains other pages. You can request a free trial to read them.

Display information about IBM Db2 UDB: